Learn More
In this paper, we propose a model to reveal faults and kill mutant using genetic algorithms. The model first instruments the source and mutant program and divides in small units. Instead of checking the entire program, it tries to find fault in each unit or kills each mutant unit. If any unit survives, the new test data is generated using genetic algorithm(More)
Data Quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to help managers to choose these tools so that that the data repositories or(More)
Data warehousing systems enable enterprise managers to acquire and integrate information from heterogeneous sources and to query very large databases efficiently. Data in a data warehouse does not conform specifically to the preferences of any single enterprise entity. Instead, it is intended to provide data to the entire enterprise in such a way that all(More)
Cloud computing is receiving a great demand among the budding and old enterprises depending on various Information Technology Services in the present IT Scenario. Cloud provides various services which mostly depend upon a good decision making process to handle various requests from service consumers. The Cloud users are mostly divided into two premium or(More)
A data warehouse is an asset for an enterprise and exists for the benefit of an entire enterpriseincluding business unit, individual customer, Student etc. Data in a data warehouse does not conform specifically to the preferences of any single enterprise entity. Instead, it is intended to provide data to the entire enterprise in such a way that all members(More)
Data Retrieval is still a pervasive challenge faced in applications that need to query across multiple autonomous and heterogeneous data sources. There is decent amount of standardization as far as WorldWide Web is concerned, while google is universal access tool to search and determine source of the information user requires there is still no such tool(More)
Information is considered to be an asset for any organizations. Malicious attacks/threats can compromise the security and trust of a system, which shall be controlled by introducing Intrusion Detection System. In order to offer maximum security for the confidential data and the corresponding data integrity, a novel Integrity model based Intrusion Detection(More)
Information Retrieval from heterogeneous information systems is required but challenging at the same as data is stored and represented in different data models in different information systems.Information integrated from heterogeneous data sources into single data source are faced upon by major challenge of information transformation-were in different(More)
With the advance in technology the focus has shifted from desktops and laptops to handheld devices like tablets, phablets, mobile phones, PDA etc. giving rise in the number of users connected to internet. About 900 million computers are connected to internet [23].In an hour 383 thousand TB of data transmission takes place [24]. As the traffic on internet(More)